MalwareIntelligence is a site dedicated to research on all matters relating to anti-malware security, criminology computing and information security in general, always from a perspective closely related to the field of intelligence.

On the one hand, strategies that seek to obtain money without greater efforts are becoming more aggressive and more invasive, and on the other, most of these kits are available online for free or on payment, in this case, a sum of money not as high as with similar pack.

Phishing attacks are becoming more dangerous because their creators seek development effectiveness in order to provide the copy is as faithful as possible to the real. This poses a potential risk associated with the combination with intrusive techniques such as malware kit (ElFiesta,MPack,IcePack, etc.), are implanted in ghosts or violated servers to spread phishing, is becoming increasingly dangerous for those unknown, even to those who know well, the operation of these attack techniques.

22.2.09

The first part could count well above what it is ZeuS, next to a small list of domains and IP addresses involved with the Trojan and useful to block them.The map below shows information relating to each host infected by ZeuS who is identified through a point. Although at first glance, the information that shows the map can give the impression of inadequate, we must take into account that each node can represent multiple IP addresses or domains hosted on one server, bringing the percentage of equipment Infected power.

Although the list is very small compared with the amount of domains that host to ZeuS, is extremely important for administrators to block them in its network structure to avoid problems of infection.

Furthermore, each of the domains, along with your IP address, represent a breach of infected host or server.

Given that the means of spread and infection employed by ZeuS are, email and technical Drive-by-Download through different exploit where one of the best known is Luckysploit, or sites which are vulnerable to malware implanted kits asElFiesta; is extremely important to block domains and IP addresses I have outlined.

21.2.09

Spamming techniques are becoming more aggressive and spammers, so to continue the financial industry that is behind the unsolicited advertising, focus all its efforts to seek "alternatives" bypas enable authentication mechanisms implemented in the webmail servers.

Consequently, in recent days, the boxes of millions of users have been bombarded by a significant amount of spam under alluding to matters erotic and pornographic videos of celebrities, use the Google service to disseminate pornographic spam group.

Some of the phrases used in the case to capture the attention of the users are:

Hey! It is Erica. Want to date?Hi! This is Dana from last Monday video shoot.Hello!It is Standard. Could not reach you.Jessica Alba was caught naked in a sauna!Jennifer Aniston was caught naked in a sauna!Jennifer Love Hewitt's nude beach photos!Cameron Diaz's nude beach photos!Denise Richards's fitting room hidden pics!Shakira and her mystery boyfriend pics!Hi! It is Deena. Fresh legal teens who just got to pose.Hi! This is Amelia. Fresh legal teens who just got to pose.

On the other hand, some of the profiles used in the service in question are:

The list is really long enough to reflect each of the addresses in this post, however, the examples are enough to get a feel focused enough to understand that spam is a problem that affects everyone equally and that the Today business is one of the most exploited.